Johannes Ernst NetMesh Inc. http://netmesh.info/jernst
Johannes Ernst
Internet Identity Workshop IIW 2008b Introduction Johannes Ernst - - PowerPoint PPT Presentation
Internet Identity Workshop IIW 2008b Introduction Johannes Ernst NetMesh Inc. http://netmesh.info/jernst Johannes Ernst Modern Identity History Facebook Proprietary et al. Yadis URL-based Age of identity Card-based interop
Johannes Ernst NetMesh Inc. http://netmesh.info/jernst
Johannes Ernst
Johannes Ernst
Proprietary URL-based Card-based Invisible 1999 2001 2005 2007 2009 2003 Facebook et al. Age of identity interop Yadis IIW
Johannes Ernst
Source: http://netmesh.info/jernst/Digital_Identity/updating-three-standards.html
Proprietary
user- centric
Johannes Ernst
Relying Party Relying Party Relying Party
Identity Provider Identity Identity Is this true? Yes.
Johannes Ernst
Identity Provider
Relying Party Relying Party Relying Party Tell me about this user. Identity
Johannes Ernst
Relying Party Identity Provider Relying Party Identity Provider
Johannes Ernst
Relying Party Relying Party Relying Party
Identity Provider Identity Identity
Is this true? Yes.
Johannes Ernst
Please enter your OpenID here:
http://netmesh.info/jernst
Johannes Ernst
Johannes Ernst
Please enter your OpenID here:
http://netmesh.info/jernst
Johannes Ernst
Johannes Ernst
Source: http://socialgraph-resources.googlecode.com/svn/trunk/samples/findyours.html
Johannes Ernst
OSCON, ETel, SDForum, UML World, Emerging Communications, Harvard, World Econonic Forum…
http://netmesh.info/jernst blog
Johannes Ernst
Johannes Ernst
Johannes Ernst
Industrial mass production model Web 2.0, user-centric model
Johannes Ernst
with the user’s consent
Constrained Use
limited to necessary and justifiable parties.
“unidirectional” identifiers, thus facilitating discovery while preventing unnecessary release of correlation handles
Operators & Technologies
identity technologies run by multiple identity providers.
distributed system integrated through unambiguous human-machine communication
Across Contexts
enabling separation of contexts through multiple operators and technologies.
Source: http://www.identityblog.com/stories/2004/12/09/thelaws.html
Johannes Ernst
No Trust Trust They do something with my identity behind my back I choose how much information to reveal … and I can take it back and “switch it
Traditional marketing User-centric (future) VRM VRM
Johannes Ernst
Your website Potential customers Successfully filled
logged on [hopeless] Do we want them as customers? Won’t or can’t fill out forms or log on, but will do With user-centric identity you can get them!
Johannes Ernst
Competitor’s website Your website
$ $ $ $ $ $ $ $
Johannes Ernst
Customers (1000’s and more) Customers (1000’s and more) Affiliates (100’s) Affiliates (100’s)
Close business partners (<10) Enterprise internal 1 2 3 4 Everybody else Tier
Source: http://netmesh.info/jernst/Digital_Identity/concentric-circles-2008.html
Do we want them as customers? Do we want them as repeat customers? Do we want them to do business with us
Johannes Ernst
Relying Party Relying Party Relying Party
Authentication
Identity Identity Is this true? Yes.
Authentication
Identity Provider Relying Party Identity Provider
Cost (old-style): Password management + Password reset + Anti-phishing + Backup tape risk / management $$$ or €€€ Cost (user-centric): Key/secret management + Password reset + Anti-phishing + Backup tape risk / management + free authentication from major IdP $$ or €€
Johannes Ernst
Relying Party Relying Party Relying Party Strong Authentication Identity Identity Provider
Strong Authentication
Relying Party Identity Provider
Strong Authentication
Relying Party Identity Provider … …
“Shared token”
internet-scale common protocols
✦ voice, ✦ biometrics, ✦ client certs etc.
Johannes Ernst NetMesh Inc. http://netmesh.info/jernst
Johannes Ernst